files.com 1.0.369 → 1.0.371
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/public_key.md +5 -2
- data/docs/site.md +1 -0
- data/docs/user.md +8 -0
- data/lib/files.com/models/public_key.rb +10 -1
- data/lib/files.com/models/user.rb +15 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: '0811bbd05ab1828ae8a62a6439f3133e269c36996ef927ca24602c81333ff4a1'
|
4
|
+
data.tar.gz: fcd74ccaab330bc3d53cdf2d8e76a34667f84e6041c0a8a8e4e860f7a10e5209
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8cd726b632441a2899cde0be800fdc86f11559420a59d455a1bdf985ea2fa0010e761e2ede3a24578bdd8292d9f114da34915e0f88d555da951ee52bd9aa0aba
|
7
|
+
data.tar.gz: 23e0abdef92a20a351d2ff3f42986acabe310e13b7c8dc1f8ddd063dcaa126c9ec11c256e533e14a112635269547abf058223022de30b2c01c2f742a9775515e
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.0.
|
1
|
+
1.0.371
|
data/docs/public_key.md
CHANGED
@@ -7,7 +7,9 @@
|
|
7
7
|
"id": 1,
|
8
8
|
"title": "My public key",
|
9
9
|
"created_at": "2000-01-01T01:00:00Z",
|
10
|
-
"fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8"
|
10
|
+
"fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8",
|
11
|
+
"username": "User",
|
12
|
+
"user_id": 1
|
11
13
|
}
|
12
14
|
```
|
13
15
|
|
@@ -15,7 +17,8 @@
|
|
15
17
|
* `title` (string): Public key title
|
16
18
|
* `created_at` (date-time): Public key created at date/time
|
17
19
|
* `fingerprint` (string): Public key fingerprint
|
18
|
-
* `
|
20
|
+
* `username` (string): Username of the user this public key is associated with
|
21
|
+
* `user_id` (int64): User ID this public key is associated with
|
19
22
|
* `public_key` (string): Actual contents of SSH key.
|
20
23
|
|
21
24
|
|
data/docs/site.md
CHANGED
data/docs/user.md
CHANGED
@@ -48,6 +48,7 @@
|
|
48
48
|
"public_keys_count": 1,
|
49
49
|
"receive_admin_alerts": true,
|
50
50
|
"require_2fa": "always_require",
|
51
|
+
"require_login_by": "2000-01-01T01:00:00Z",
|
51
52
|
"active_2fa": true,
|
52
53
|
"require_password_change": true,
|
53
54
|
"password_expired": true,
|
@@ -110,6 +111,7 @@
|
|
110
111
|
* `public_keys_count` (int64): Number of public keys associated with this user
|
111
112
|
* `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
|
112
113
|
* `require_2fa` (string): 2FA required setting
|
114
|
+
* `require_login_by` (date-time): Require user to login by specified date otherwise it will be disabled.
|
113
115
|
* `active_2fa` (boolean): Is 2fa active for the user?
|
114
116
|
* `require_password_change` (boolean): Is a password change required upon next user login?
|
115
117
|
* `password_expired` (boolean): Is user's password expired?
|
@@ -214,6 +216,7 @@ Files::User.create(
|
|
214
216
|
office_integration_enabled: true,
|
215
217
|
password_validity_days: 1,
|
216
218
|
receive_admin_alerts: true,
|
219
|
+
require_login_by: "2000-01-01T01:00:00Z",
|
217
220
|
require_password_change: true,
|
218
221
|
restapi_permission: true,
|
219
222
|
self_managed: true,
|
@@ -263,6 +266,7 @@ Files::User.create(
|
|
263
266
|
* `office_integration_enabled` (boolean): Enable integration with Office for the web?
|
264
267
|
* `password_validity_days` (int64): Number of days to allow user to use the same password
|
265
268
|
* `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
|
269
|
+
* `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
|
266
270
|
* `require_password_change` (boolean): Is a password change required upon next user login?
|
267
271
|
* `restapi_permission` (boolean): Can this user access the REST API?
|
268
272
|
* `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
|
@@ -347,6 +351,7 @@ Files::User.update(id,
|
|
347
351
|
office_integration_enabled: true,
|
348
352
|
password_validity_days: 1,
|
349
353
|
receive_admin_alerts: true,
|
354
|
+
require_login_by: "2000-01-01T01:00:00Z",
|
350
355
|
require_password_change: true,
|
351
356
|
restapi_permission: true,
|
352
357
|
self_managed: true,
|
@@ -397,6 +402,7 @@ Files::User.update(id,
|
|
397
402
|
* `office_integration_enabled` (boolean): Enable integration with Office for the web?
|
398
403
|
* `password_validity_days` (int64): Number of days to allow user to use the same password
|
399
404
|
* `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
|
405
|
+
* `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
|
400
406
|
* `require_password_change` (boolean): Is a password change required upon next user login?
|
401
407
|
* `restapi_permission` (boolean): Can this user access the REST API?
|
402
408
|
* `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
|
@@ -502,6 +508,7 @@ user.update(
|
|
502
508
|
office_integration_enabled: true,
|
503
509
|
password_validity_days: 1,
|
504
510
|
receive_admin_alerts: true,
|
511
|
+
require_login_by: "2000-01-01T01:00:00Z",
|
505
512
|
require_password_change: true,
|
506
513
|
restapi_permission: true,
|
507
514
|
self_managed: true,
|
@@ -552,6 +559,7 @@ user.update(
|
|
552
559
|
* `office_integration_enabled` (boolean): Enable integration with Office for the web?
|
553
560
|
* `password_validity_days` (int64): Number of days to allow user to use the same password
|
554
561
|
* `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
|
562
|
+
* `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
|
555
563
|
* `require_password_change` (boolean): Is a password change required upon next user login?
|
556
564
|
* `restapi_permission` (boolean): Can this user access the REST API?
|
557
565
|
* `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
|
@@ -41,7 +41,16 @@ module Files
|
|
41
41
|
@attributes[:fingerprint] = value
|
42
42
|
end
|
43
43
|
|
44
|
-
#
|
44
|
+
# string - Username of the user this public key is associated with
|
45
|
+
def username
|
46
|
+
@attributes[:username]
|
47
|
+
end
|
48
|
+
|
49
|
+
def username=(value)
|
50
|
+
@attributes[:username] = value
|
51
|
+
end
|
52
|
+
|
53
|
+
# int64 - User ID this public key is associated with
|
45
54
|
def user_id
|
46
55
|
@attributes[:user_id]
|
47
56
|
end
|
@@ -383,6 +383,15 @@ module Files
|
|
383
383
|
@attributes[:require_2fa] = value
|
384
384
|
end
|
385
385
|
|
386
|
+
# date-time - Require user to login by specified date otherwise it will be disabled.
|
387
|
+
def require_login_by
|
388
|
+
@attributes[:require_login_by]
|
389
|
+
end
|
390
|
+
|
391
|
+
def require_login_by=(value)
|
392
|
+
@attributes[:require_login_by] = value
|
393
|
+
end
|
394
|
+
|
386
395
|
# boolean - Is 2fa active for the user?
|
387
396
|
def active_2fa
|
388
397
|
@attributes[:active_2fa]
|
@@ -691,6 +700,7 @@ module Files
|
|
691
700
|
# office_integration_enabled - boolean - Enable integration with Office for the web?
|
692
701
|
# password_validity_days - int64 - Number of days to allow user to use the same password
|
693
702
|
# receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
|
703
|
+
# require_login_by - string - Require user to login by specified date otherwise it will be disabled.
|
694
704
|
# require_password_change - boolean - Is a password change required upon next user login?
|
695
705
|
# restapi_permission - boolean - Can this user access the REST API?
|
696
706
|
# self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
|
@@ -728,6 +738,7 @@ module Files
|
|
728
738
|
raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
|
729
739
|
raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
|
730
740
|
raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
|
741
|
+
raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
|
731
742
|
raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
|
732
743
|
raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
|
733
744
|
raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
|
@@ -851,6 +862,7 @@ module Files
|
|
851
862
|
# office_integration_enabled - boolean - Enable integration with Office for the web?
|
852
863
|
# password_validity_days - int64 - Number of days to allow user to use the same password
|
853
864
|
# receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
|
865
|
+
# require_login_by - string - Require user to login by specified date otherwise it will be disabled.
|
854
866
|
# require_password_change - boolean - Is a password change required upon next user login?
|
855
867
|
# restapi_permission - boolean - Can this user access the REST API?
|
856
868
|
# self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
|
@@ -884,6 +896,7 @@ module Files
|
|
884
896
|
raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
|
885
897
|
raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
|
886
898
|
raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
|
899
|
+
raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
|
887
900
|
raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
|
888
901
|
raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
|
889
902
|
raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
|
@@ -960,6 +973,7 @@ module Files
|
|
960
973
|
# office_integration_enabled - boolean - Enable integration with Office for the web?
|
961
974
|
# password_validity_days - int64 - Number of days to allow user to use the same password
|
962
975
|
# receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
|
976
|
+
# require_login_by - string - Require user to login by specified date otherwise it will be disabled.
|
963
977
|
# require_password_change - boolean - Is a password change required upon next user login?
|
964
978
|
# restapi_permission - boolean - Can this user access the REST API?
|
965
979
|
# self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
|
@@ -996,6 +1010,7 @@ module Files
|
|
996
1010
|
raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
|
997
1011
|
raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
|
998
1012
|
raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
|
1013
|
+
raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
|
999
1014
|
raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
|
1000
1015
|
raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
|
1001
1016
|
raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: files.com
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0.
|
4
|
+
version: 1.0.371
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- files.com
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-07-
|
11
|
+
date: 2023-07-19 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: addressable
|